Encryption with a list of classic field-ciphers. Encrypt swift and easy with this program, or try out the pencil-and-paper versions by following the instructions on how to use them "in the field", as many secret agents and soldiers did. Use ADFGVX, Caesar ...(description truncated)(ScreenShot)

This program is an exact simulation of the 3-rotor Army and famous 4-rotor Naval M4, used on U-boats, of the German Enigma cipher machine, as it was used during World War II from 1939 until 1945. You can select between the two models, choose different rot ...(description truncated)(ScreenShot)

How secure is the password I use? Is my key easy to crack? This function checks the quality from your password or key and returns a rating value between 0 and 100. The returnvalue could be used to fill a progressbar to visualize the password quality, to r ...(description truncated)(ScreenShot)

Want to make your own encryption algorithm? Taking your first steps into cryptology? Busy for a while but not too sure about it? Think your encryption is strong? Read this article first and get some good tips!

This is a whole new concept for entering passwords. By using this system, it's impossible to steal your passwords by keylogging, capturing mouse events or positions, screencaptures or hooking those really unsafe textboxes with hidden but unsafe passwordch ...(description truncated)(ScreenShot)

Foil Password Loggers
FPLv1.FRM is a form you can use to obtain a password from the user in a way that key loggers and people looking over your shoulder cannot capture the password.
It comes up as a normal small password entry box with the prompt "Use sec ...(description truncated)(ScreenShot)

My nonprogramming sites: The Real Estate Crowdfunding Review: Investing tools that cut through the clutter and the hype.
Real information and reviews. Real-time investment feeds. Real profitable. | Dollar candy: Play 60 second puzzles against three other people for real money! Legal in 36 states and overseas.